+

Li et al., 2025 - Google Patents

Verifiable Encrypted Image Retrieval with Reversible Data Hiding in Cloud Environment

Li et al., 2025

Document ID
3209524692716608351
Author
Li M
Zhu Y
Du R
Jia C
Publication year
Publication venue
IEEE Transactions on Cloud Computing

External Links

Snippet

With growing numbers of users outsourcing images to cloud servers, privacy-preserving content-based image retrieval (CBIR) is widely studied. However, existing privacy- preserving CBIR schemes have limitations in terms of low search accuracy and efficiency …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30244Information retrieval; Database structures therefor; File system structures therefor in image databases
    • G06F17/30247Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data
    • G06F17/30256Information retrieval; Database structures therefor; File system structures therefor in image databases based on features automatically derived from the image data using a combination of image content features
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6217Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
    • G06K9/6232Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
    • G06K9/6247Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30781Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F17/30784Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
    • G06F17/30799Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6201Matching; Proximity measures
    • G06K9/6202Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00281Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00275Holistic features and representations, i.e. based on the facial image taken as a whole
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data

Similar Documents

Publication Publication Date Title
Chai et al. TPE-GAN: Thumbnail preserving encryption based on GAN with key
CN113538203B (en) Image encryption method and device based on novel two-dimensional composite chaotic mapping and SHA-256
Xia et al. A privacy-preserving image retrieval scheme using secure local binary pattern in cloud computing
Zhang et al. F-TPE: Flexible thumbnail-preserving encryption based on multi-pixel sum-preserving encryption
Liu et al. Intelligent and secure content-based image retrieval for mobile users
CN110659379B (en) A Searchable Encrypted Image Retrieval Method Based on Deep Convolutional Network Features
Koppu et al. A fast enhanced secure image chaotic cryptosystem based on hybrid chaotic magic transform
Li et al. Traceable and controllable encrypted cloud image search in multi-user settings
Kim et al. Efficient Privacy‐Preserving Fingerprint‐Based Authentication System Using Fully Homomorphic Encryption
CN116861485A (en) Student information privacy protection method based on deep learning fusion
Wang et al. Chaotic image encryption algorithm based on dynamic spiral scrambling transform and deoxyribonucleic acid encoding operation
Chen et al. Adaptive coding and ordered-index extended scrambling based RDH in encrypted images
Anju et al. A secure image outsourcing using privacy-preserved local color layout descriptor in cloud environment
Zhang et al. FSAIR: Fine-grained secure approximate image retrieval for mobile cloud computing
Kayani et al. Privacy preserving content based image retrieval
Deb et al. Enhancing image security via block cyclic construction and DNA based LFSR
Yu et al. A two-stage chaotic encryption algorithm for color face image based on circular diffusion
Li et al. Verifiable Encrypted Image Retrieval with Reversible Data Hiding in Cloud Environment
CN118172821A (en) A privacy-preserving face recognition method based on symmetric homomorphic encryption
Li et al. Secure verification encrypted image retrieval scheme with addition homomorphic bitmap index
Teng et al. A multi-medical image encryption algorithm based on ROI and DNA coding
CN117494182A (en) A facial image regional information encryption method based on four-dimensional chaotic system
Yang Development and future of information hiding in image transformation domain: A literature review
CN115828194A (en) Data privacy protection method and detection method of privacy enhanced semi-blind digital fingerprint
Lafta et al. Secure Content-Based Image Retrieval with Copyright Protection within Cloud Computing Environment.
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载